What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Itai Dinur
Google Scholar
49
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Combining Outputs of a Random Permutation: New Constructions and Tight Security Bounds by Fourier Analysis.
Itai Dinur
2024
conf/eurocrypt
Tight Indistinguishability Bounds for the XOR of Independent Random Permutations by Fourier Analysis.
Itai Dinur
2023
conf/eurocrypt
On Differential Privacy and Adaptive Data Analysis with Bounded Space.
Itai Dinur
Uri Stemmer
David P. Woodruff
Samson Zhou
2023
conf/eurocrypt
Efficient Detection of High Probability Statistical Properties of Cryptosystems via Surrogate Differentiation.
Itai Dinur
Orr Dunkelman
Nathan Keller
Eyal Ronen
Adi Shamir
2022
journals/tosc
Preface to Volume 2022, Issue 1.
Itai Dinur
Bart Mennink
2022
conf/eurocrypt
Refined Cryptanalysis of the GPRS Ciphers GEA-1 and GEA-2.
Dor Amzaleg
Itai Dinur
2021
conf/crypto
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
Itai Dinur
Steven Goldfeder
Tzipora Halevi
Yuval Ishai
Mahimna Kelkar
Vivek Sharma
Greg Zaverucha
2021
conf/eurocrypt
Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).
Itai Dinur
2021
conf/tcc
Distributed Merkle's Puzzles.
Itai Dinur
Ben Hasson
2020
journals/tosc
Preface to Volume 2020, Special Issue on Designs for the NIST Lightweight Standardisation Process.
Itai Dinur
Gaëtan Leurent
2020
journals/joc
Cryptanalytic Time-Memory-Data Trade-offs for FX-Constructions and the Affine Equivalence Problem.
Itai Dinur
2020
journals/joc
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.
Itai Dinur
Nathan Keller
Ohad Klein
2020
journals/joc
Generic Attacks on Hash Combiners.
Zhenzhen Bao
Itai Dinur
Jian Guo
Gaëtan Leurent
Lei Wang
2020
conf/crypto
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Tim Beyne
Anne Canteaut
Itai Dinur
Maria Eichlseder
Gregor Leander
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Yu Sasaki
Yosuke Todo
Friedrich Wiemer
2020
conf/eurocrypt
Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications.
Itai Dinur
2020
conf/eurocrypt
On the Streaming Indistinguishability of a Random Permutation and a Random Function.
Itai Dinur
2019
journals/joc
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2019
conf/eurocrypt
Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC.
Itai Dinur
Daniel Kales
Angela Promitzer
Sebastian Ramacher
Christian Rechberger
2019
conf/eurocrypt
Multi-target Attacks on the Picnic Signature Scheme and Related Protocols.
Itai Dinur
Niv Nadler
2018
conf/crypto
An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing.
Itai Dinur
Nathan Keller
Ohad Klein
2018
conf/eurocrypt
An Improved Affine Equivalence Algorithm for Random Permutations.
Itai Dinur
2017
conf/crypto
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme.
Itai Dinur
Niv Nadler
2017
conf/ctrsa
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Jihoon Cho
Kyu Young Choi
Itai Dinur
Orr Dunkelman
Nathan Keller
Dukjae Moon
Aviya Veidberg
2016
journals/joc
Key Recovery Attacks on Iterated Even-Mansour Encryption Schemes.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2016
conf/crypto
Memory-Efficient Algorithms for Finding Needles in Haystacks.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2016
conf/eurocrypt
New Attacks on the Concatenation and XOR Hash Combiners.
Itai Dinur
2015
conf/latincrypt
Improved Top-Down Techniques in Differential Cryptanalysis.
Itai Dinur
Orr Dunkelman
Masha Gutman
Adi Shamir
2015
conf/crypto
New Attacks on Feistel Structures with Improved Memory Complexities.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2015
conf/eurocrypt
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE.
Itai Dinur
2015
conf/eurocrypt
Cryptanalysis of SP Networks with Partial Non-Linear Layers.
Achiya Bar-On
Itai Dinur
Orr Dunkelman
Virginie Lallemand
Nathan Keller
Boaz Tsaban
2015
conf/eurocrypt
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function.
Itai Dinur
Pawel Morawiecki
Josef Pieprzyk
Marian Srebrny
Michal Straus
2015
conf/asiacrypt
Optimized Interpolation Attacks on LowMC.
Itai Dinur
Yunwen Liu
Willi Meier
Qingju Wang
2014
journals/joc
Improved Practical Attacks on Round-Reduced Keccak.
Itai Dinur
Orr Dunkelman
Adi Shamir
2014
conf/fse
Cryptanalysis of FIDES.
Itai Dinur
Jérémy Jean
2014
conf/fse
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2014
conf/crypto
Improved Generic Attacks against Hash-Based MACs and HAIFA.
Itai Dinur
Gaëtan Leurent
2014
conf/asiacrypt
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2014
conf/sacrypt
Improved Differential Cryptanalysis of Round-Reduced Speck.
Itai Dinur
2013
conf/fse
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials.
Itai Dinur
Orr Dunkelman
Adi Shamir
2013
conf/asiacrypt
Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2012
conf/fse
Improved Attacks on Full GOST.
Itai Dinur
Orr Dunkelman
Adi Shamir
2012
conf/fse
New Attacks on Keccak-224 and Keccak-256.
Itai Dinur
Orr Dunkelman
Adi Shamir
2012
conf/crypto
Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems.
Itai Dinur
Orr Dunkelman
Nathan Keller
Adi Shamir
2011
conf/fse
Breaking Grain-128 with Dynamic Cube Attacks.
Itai Dinur
Adi Shamir
2011
conf/fse
An Improved Algebraic Attack on Hamsi-256.
Itai Dinur
Adi Shamir
2011
conf/asiacrypt
An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware.
Itai Dinur
Tim Güneysu
Christof Paar
Adi Shamir
Ralf Zimmermann
2010
conf/fdtc
Generic Analysis of Small Cryptographic Leaks.
Itai Dinur
Adi Shamir
2009
conf/fse
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium.
Jean-Philippe Aumasson
Itai Dinur
Willi Meier
Adi Shamir
2009
conf/eurocrypt
Cube Attacks on Tweakable Black Box Polynomials.
Itai Dinur
Adi Shamir
Coauthors
Achiya Bar-On
(1)
Adi Shamir
(20)
Angela Promitzer
(1)
Anne Canteaut
(1)
Aviya Veidberg
(1)
Bart Mennink
(1)
Ben Hasson
(1)
Boaz Tsaban
(1)
Christian Rechberger
(1)
Christof Paar
(1)
Daniel Kales
(1)
David P. Woodruff
(1)
Dor Amzaleg
(1)
Dukjae Moon
(1)
Eyal Ronen
(1)
Friedrich Wiemer
(1)
Gaëtan Leurent
(4)
Greg Zaverucha
(1)
Gregor Leander
(1)
Itai Dinur
(49)
Jean-Philippe Aumasson
(1)
Jérémy Jean
(1)
Jian Guo
(1)
Jihoon Cho
(1)
Josef Pieprzyk
(1)
Kyu Young Choi
(1)
Lei Wang
(1)
Léo Perrin
(1)
Mahimna Kelkar
(1)
Maria Eichlseder
(1)
María Naya-Plasencia
(1)
Marian Srebrny
(1)
Masha Gutman
(1)
Michal Straus
(1)
Nathan Keller
(13)
Niv Nadler
(2)
Ohad Klein
(2)
Orr Dunkelman
(16)
Pawel Morawiecki
(1)
Qingju Wang
(1)
Ralf Zimmermann
(1)
Samson Zhou
(1)
Sebastian Ramacher
(1)
Steven Goldfeder
(1)
Tim Beyne
(1)
Tim Güneysu
(1)
Tzipora Halevi
(1)
Uri Stemmer
(1)
Virginie Lallemand
(1)
Vivek Sharma
(1)
Willi Meier
(2)
Yosuke Todo
(1)
Yu Sasaki
(1)
Yunwen Liu
(1)
Yuval Ishai
(1)
Zhenzhen Bao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to